<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: concatene 2 similar search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458821#M168089</link>
    <description>&lt;P&gt;oh i found for the 3 key &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;
so just tell me please what is the reason why you user "rex" and "chart"?&lt;BR /&gt;
thanks&lt;/P&gt;</description>
    <pubDate>Sun, 05 Aug 2018 08:39:57 GMT</pubDate>
    <dc:creator>jip31</dc:creator>
    <dc:date>2018-08-05T08:39:57Z</dc:date>
    <item>
      <title>concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458812#M168080</link>
      <description>&lt;P&gt;hi&lt;/P&gt;

&lt;P&gt;i try to concatene 2 similar query&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| join type=outer host [search earliest=-120d index=windows sourcetype=winregistry 
key_path="\\registry\\machine\\software\\wow6432node\\XX\\master\\PatchLevel" 
| stats first(data) as PatchLevel by host
]


| join type=outer host [search earliest=-120d index=windows sourcetype=winregistry 
key_path="\\registry\\machine\\software\\wow6432node\\XX\\master\\WindowsVersion" 

| stats first(data) as WindowsVersion by host
]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;i m doing something like this  but it doesnt works&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| join type=outer host [search earliest=-120d index=windows sourcetype=winregistry 
key_path="\\registry\\machine\\software\\wow6432node\\XX\\master\\PatchLevel" 
OR
key_path="\\registry\\machine\\software\\wow6432node\\XX\\master\\WindowsVersion" 
|stats first(data) as PatchLevel by host, first(data) as WindowsVersion by host]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 27 Jul 2018 07:15:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458812#M168080</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-07-27T07:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458813#M168081</link>
      <description>&lt;P&gt;@jip31,&lt;/P&gt;

&lt;P&gt;Try something like this .. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| join type=outer host [search earliest=-120d index=windows sourcetype=winregistry 
 key_path="\\registry\\machine\\software\\wow6432node\\airbus\\master\\PatchLevel" 
 OR
 key_path="\\registry\\machine\\software\\wow6432node\\airbus\\master\\WindowsVersion" 
 |stats first(data) as PatchLevel , first(data) as WindowsVersion by host,data]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 27 Jul 2018 07:26:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458813#M168081</guid>
      <dc:creator>Shan</dc:creator>
      <dc:date>2018-07-27T07:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458814#M168082</link>
      <description>&lt;P&gt;it doesnt works&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jul 2018 08:10:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458814#M168082</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-07-27T08:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458815#M168083</link>
      <description>&lt;P&gt;please modify the key like in your answer :&lt;BR /&gt;
\registry\machine\software\wow6432node\*&lt;EM&gt;XX*&lt;/EM&gt;\master\PatchLevel" &lt;/P&gt;</description>
      <pubDate>Fri, 27 Jul 2018 08:11:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458815#M168083</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-07-27T08:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458816#M168084</link>
      <description>&lt;P&gt;hello&lt;BR /&gt;
nobody for helping me please??&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 05:20:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458816#M168084</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-08-02T05:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458817#M168085</link>
      <description>&lt;P&gt;something like this??&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;join type=outer host [append [search earliest=-120d index=windows sourcetype=winregistry 
key_path="\\registry\\machine\\software\\wow6432node\\xx\\master\\PatchLevel" 
 OR   key_path="\\registry\\machine\\software\\wow6432node\\xx\\master\\WindowsVersion" 
  |stats first(data) as PatchLevel , first(data) as WindowsVersion by host,data
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 02 Aug 2018 06:02:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458817#M168085</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-08-02T06:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458818#M168086</link>
      <description>&lt;P&gt;In fact my main question is To know how to use append with a jointure field (host in my example)?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 17:04:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458818#M168086</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-08-02T17:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458819#M168087</link>
      <description>&lt;P&gt;Try like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| join type=outer host [search earliest=-120d index=windows sourcetype=winregistry 
 key_path="\\registry\\machine\\software\\wow6432node\\XX\\master\\PatchLevel" 
 OR
 key_path="\\registry\\machine\\software\\wow6432node\\XX\\master\\WindowsVersion" 
 | rex field=key_path "(?&amp;lt;type&amp;gt;\w+)$" | chart first(data) by host type]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 02 Aug 2018 17:29:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458819#M168087</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-08-02T17:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458820#M168088</link>
      <description>&lt;P&gt;Hi and thanks&lt;BR /&gt;
it works for these 2 key path&lt;BR /&gt;
BUT&lt;BR /&gt;
I need to add o ne key and i done this &lt;BR /&gt;
    | join type=outer host [search earliest=-120d index=windows sourcetype=winregistry &lt;BR /&gt;
    key_path="\registry\machine\software\wow6432node\xx\master\PatchLevel" &lt;BR /&gt;
    OR&lt;BR /&gt;
    key_path="\registry\machine\software\wow6432node\xx\master\WindowsVersion" &lt;BR /&gt;
    OR&lt;BR /&gt;
    key_path="\registry\machine\software\microsoft\windows nt\currentversion\ReleaseId"&lt;BR /&gt;
    | rex field=key_path "(?&lt;TYPE&gt;\w+)$" | chart first(data) by host type]&lt;/TYPE&gt;&lt;/P&gt;

&lt;P&gt;But i have no data for ReleaseID&lt;BR /&gt;
Other questions :&lt;BR /&gt;
what is the reason why you user "rex" and "chart"?&lt;BR /&gt;
thanks&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:43:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458820#M168088</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2020-09-29T20:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: concatene 2 similar search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458821#M168089</link>
      <description>&lt;P&gt;oh i found for the 3 key &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;
so just tell me please what is the reason why you user "rex" and "chart"?&lt;BR /&gt;
thanks&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 08:39:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/concatene-2-similar-search/m-p/458821#M168089</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2018-08-05T08:39:57Z</dc:date>
    </item>
  </channel>
</rss>

